18455602. GENERATING A SCREENING INTERFACE FOR COMMUNICATIONS simplified abstract (Capital One Services, LLC)

From WikiPatents
Jump to navigation Jump to search

GENERATING A SCREENING INTERFACE FOR COMMUNICATIONS

Organization Name

Capital One Services, LLC

Inventor(s)

Asher Smith-rose of Midlothian VA (US)

Tyler Maiman of Melville NY (US)

Lin Ni Lisa Cheng of New York NY (US)

Salik Shah of Washington DC (US)

GENERATING A SCREENING INTERFACE FOR COMMUNICATIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18455602 titled 'GENERATING A SCREENING INTERFACE FOR COMMUNICATIONS

Simplified Explanation

Methods and systems are described in this patent application for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters.

  • When a communication is detected from one device to another device, it may be considered risky.
  • The system mitigates this risk by providing the user with information about the source of the communication, allowing them to reject it if desired.
  • If the user accepts the communication, the system enables monitoring of the communication.
  • The system also restricts any accounts that are disclosed within the communication.

Potential Applications

  • This technology can be applied in various communication platforms, such as messaging apps, voice call services, and video conferencing tools.
  • It can be used to enhance security and privacy by giving users more control over incoming communications.
  • This technology can be integrated into customer service systems to verify the authenticity of incoming calls and protect against fraudulent activities.

Problems Solved

  • Risky communications can pose a threat to users, such as phishing attempts or fraudulent calls.
  • Users may unknowingly disclose sensitive information during a communication, leading to potential security breaches.
  • It can be challenging for users to differentiate between legitimate and risky communications.

Benefits

  • Users are provided with information about the source of a communication, allowing them to make informed decisions on whether to accept or reject it.
  • Monitoring of accepted communications helps detect and prevent potential security breaches.
  • Restricting access to disclosed accounts adds an extra layer of protection for users' sensitive information.


Original Abstract Submitted

Methods and systems are described herein for manipulating a communication acceptance screen, manipulating an interactive communication acceptance icon, and restricting access to accounts based on voice communication parameters. In particular, when a communication is detected from one device to another device, that communication may be risky. Thus, the risk is mitigated by giving a user information about the source of the communication to give a user a chance to reject the communication. In addition, in instances where the user accepts the communication, the system enables monitoring the communication and restricting any accounts that are disclosed within the communication.